Table of Contents

It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Affected Packages State

Platform

Package

State

Red Hat Enterprise MRG 2

kernel

Affected

Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

Acknowledgements

The security impact of this issue was discovered by Red Hat.

This page is generated automatically and has not been checked for errors or omissions.